Citizens' Issues
6 Tips for Protecting Your Communications From Prying Eyes
In an age of ubiquitous surveillance, there are still some things you can do to keep your communications private -- and not all of it is high-tech
 
This is the latest in a series we've done about how to protect your privacy. This post is based on a tip sheet that I prepared for a panel discussion about how journalists can communicate securely with sources at the 2015 Investigative Reporters and Editors Conference.
 
It's easy to feel hopeless about privacy these days.
 
In the post-Snowden era, we have learned that nearly every form of communication-from emails, phone calls, to text messages – can leave a digital trace that can and likely will be analyzed by commercial data-gatherers and governments.
 
Here are some ways to keep those communications private. While these tips were designed for journalists and confidential sources, they're just as useful for protecting any private communications, such as a conversation between family members, or a confidential business dealing.
 
Some tactics are more difficult than others, but the good news is that not all of them require technical skills. The key is to figure out your communication strategy. First, decide if you are trying to hide WHO you are talking to (metadata) or WHAT you are talking about (content), or BOTH.
 
In each case, there are both high-tech and low-tech ways to evade surveillance.
 
If you are trying to mask WHO you are talking to, consider three tactics that I call ACE — which stands for "Add Noise, Cloak or Evade."
 
Add noise means fuzzing the metadata by adding false connections or false content to the communications. 
 
A high-tech way to add noise online is to use Tor Web browser which bounces your Internet traffic around to a bunch of locations so that the website you arrive at doesn't know where you are coming from.
 
You could also add noise in a low-tech way. If, for instance, you are a journalist calling a source in the mayor's office, you could also call everyone in the office, too. That protects the source from being the only one with a record of a call with you. (However, you should talk for a short time and set up another means of communications to avoid creating a data trail of a long conversation).
 
Cloak means using alternate identities. 
 
Another way to mask who you are talking to is to set up new accounts – whether it is email, instant messaging or a cellphone – using alternate identities.
 
For these disposable online accounts, it's best to use Tor when setting up a disposable email (instructions here) or instant messaging account (instructions here for Windows and Mac) so that your location is not revealed during the setup and use of the account.
 
For disposable cellphones, also known as burner phones, the best practice is to buy them in cash in a location not close to your usual work and home (because your location is a very distinctive giveaway). Give one to your correspondent and set up a time in which you will each go to a location that is not on your usual route in order to make the call.
 
Evade means avoiding metadata collection. 
 
This usually means meeting in person, and turning off your phones (or, even better, leaving your phone at home) so there is not a record of your phones being in the same place. The challenge is to avoid using digital forms of communication to arrange the in-person meeting.
 
If you are trying to mask WHAT you are talking about, I suggest three strategies that I call HEM — which stands for "Hide, Encrypt or Mask." 
 
Hide means hiding the existence of the content, by placing it in a secret compartment either physically or digitally. 
 
Hiding content can be as low-tech as hiding a USB stick in your pocket (as long as you are not going through a border or airline inspection).
 
Or it can be as high-tech as creating a hidden volume of encrypted content on your computer (a program called TrueCrypt offers this feature) that is not detectable to a person inspecting your computer.
 
Encrypt means to make content unreadable to outsiders using cryptographic techniques. 
 
Encryption scrambles your messages in ways that are extremely difficult for even the most powerful computers to break.
 
In the post-Snowden era, new encryption services seem to be sprouting every month. To sort out the best services, we ranked many of them last year in a joint project with the Electronic Frontier Foundation.
 
For encrypted communications to work, both parties must install the same software - whether it is the encrypted iPhone app Signal for text messages and voice, calls or the widely used GPG software for email encryption. (Instructions here for Mac and Windows users).
 
Mask means disguising the content as an innocuous other type of content. 
 
Known as steganography, this is the art of hiding a message in plain sight. For example, a teenager may post a song lyric to her Facebook page, which conveys a certain meaning to her friends, but is impenetrable to her parents.
 
For this to work, both parties must agree on the meaning of their messages in advance - whether it is using code words or physical symbols - such as the famous flower pot on the balcony that "Deep Throat" apparently moved when he wanted to signal a request for a meeting with journalist Bob Woodward.
 
Courtesy: ProPublica

User

Radar fault grounds all New Zealand flights
Limited flights out of Auckland are set to resume after a radar fault grounded planes across New Zealand on Tuesday.
 
Auckland International Airport spokesman Simon Lambourne said a fault occurred with air navigation service provider, Airways New Zealand, Stuff online reported.
 
A limited number of flights should resume later in the day, he said.
 
Transport Minister Simon Bridges said the cause of the fault remains unknown but there was no risk to the safety of passengers on planes.
 
"All aircraft nationwide are being held on the ground at the moment. There's no aircraft taking off," an Airways New Zealand spokesperson said.
 

User

Infosys investors cut up with board members

A woman investor from Mumbai grabbed the mike and shouted through vide-link that the board did not give female shareholders an opportunity to speak with its members at the AGM

 

Many investors of global software major Infosys Ltd were up in arms against its board at the 34th annual general meeting here on Monday for various reasons.
 
A woman investor from Mumbai grabbed the mike and shouted through vide-link that the board did not give female shareholders an opportunity to speak with its members at the AGM.
 
"Besides the chairman (R Seshasayee), all other directors spoke at length though only a chairman addresses shareholders at AGMs in other companies. We have been waiting for over three hours to talk on the annual report," fumed the woman.
 
Another shareholder, Sadananda Sastry, blasted the company for not giving audience with its earlier chairman (KV Kamath).
 
"I was kicked out of the scene, humiliated. The chairman should meet at least a few shareholders," Shastri complained to the board members sitting on the dais.
 
Another one also wanted the company to develop an exclusive application for shareholders like the US-based global manufacturer General Electric (GE) for quick access and updates on its global operations. 
 

User

We are listening!

Solve the equation and enter in the Captcha field.
  Loading...
Close

To continue


Please
Sign Up or Sign In
with

Email
Close

To continue


Please
Sign Up or Sign In
with

Email

BUY NOW

The Scam
24 Year Of The Scam: The Perennial Bestseller, reads like a Thriller!
Moneylife Magazine
Fiercely independent and pro-consumer information on personal finance
Stockletters in 3 Flavours
Outstanding research that beats mutual funds year after year
MAS: Complete Online Financial Advisory
(Includes Moneylife Magazine and Lion Stockletter)